2006
DOI: 10.1007/11805588_5
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating Multi-dimensional Query Results in Data Publishing

Abstract: Abstract. In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produce incorrect query results. This paper introduces a mechanism for users to verify that their query answers on a multi-dimensional dataset are correct, in the sense of being complete (i.e., no qualifying data points are omitted) and authentic (i.e., all the result values originated from the owner). Our approach is to add auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
47
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(48 citation statements)
references
References 20 publications
(30 reference statements)
1
47
0
Order By: Relevance
“…Cheng et al [5] apply signature chaining to devise authenticated versions of the KD-Tree and the R-Tree (called the VKD-Tree and the VR-Tree, respectively). Signature aggregation [19] can be used to reduce the communication and verification cost.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Cheng et al [5] apply signature chaining to devise authenticated versions of the KD-Tree and the R-Tree (called the VKD-Tree and the VR-Tree, respectively). Signature aggregation [19] can be used to reduce the communication and verification cost.…”
Section: Related Workmentioning
confidence: 99%
“…We implemented all methods using the Crypto++ library, 5 and deployed them on a Core 2 Duo 2.2 GHz CPU with 2 GBytes of RAM. Each record r consumes 100 bytes and contains a search key r.k which has values normalized to [0,1].…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…First, Cheng et al [3] introduce two authenticated structures, namely the Verifiable KD-Tree (VKD-Tree) and the Verifiable R-Tree (VR-Tree). Both structures are modified versions of the standard KD-Tree and R-Tree, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…However, these structures incur large space and query processing overhead for the SP, high initial construction cost for the DO, and considerable verification burden for the clients. Furthermore, they lack algorithms for insertions and deletions (updates are not discussed in [3]), which render them inapplicable to dynamic environments.…”
Section: Related Workmentioning
confidence: 99%
“…[21,22]). The general approach is to build authentication information into index tree structures like the B + -tree [13] and the R-tree [5]. In text retrieval, each term in the dictionary is considered a dimension.…”
Section: Introductionmentioning
confidence: 99%